Sciweavers

1188 search results - page 75 / 238
» Generating Connectives
Sort
View
129
Voted
CQRE
1999
Springer
15 years 7 months ago
Cryptanalysis of Microsoft's PPTP Authentication Extensions (MS-CHAPv2)
The Point-to-Point Tunneling Protocol (PPTP) is used to secure PPP connections over TCP/IP link. In response to [SM98], Microsoft released extensions to the PPTP authentication me...
Bruce Schneier, Mudge, David Wagner
GPC
2009
Springer
15 years 7 months ago
Web Services for Deeply Embedded Extra Low-Cost Devices
Abstract. This paper describes a new approach to implement Web Services in embedded devices connected to Wireless Sensor Networks. The sensor/actuator node is able to process stand...
David Villa, Felix Jesús Villanueva, Franci...
TABLEAUX
2000
Springer
15 years 7 months ago
Matrix-Based Inductive Theorem Proving
We present an approach to inductive theorem proving that integrates rippling-based rewriting into matrix-based logical proof search. The selection of appropriate connections in a m...
Christoph Kreitz, Brigitte Pientka
AGI
2008
15 years 5 months ago
Real Time Machine Deduction and AGI
: Consistent with the ultimate goals of AGI, we can expect that deductive consequences of large and grammatically varied text bases would not be generated by sequential application...
Peter G. Tripodes
FLAIRS
2004
15 years 4 months ago
Spatiotemporal Novelty Detection Using Resonance Networks
We present a single-layer recurrent neural network that implements novelty detection for spatiotemporal patterns. The architecture is based on the structure of region CA3 in the h...
Benjamin A. Rowland, Anthony S. Maida